Static task
static1
Behavioral task
behavioral1
Sample
2e452572c6d1bce3f8c8fba3f2273be0da1d27aae504466b5ae77b309ed91430.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2e452572c6d1bce3f8c8fba3f2273be0da1d27aae504466b5ae77b309ed91430.exe
Resource
win10v2004-20220812-en
General
-
Target
2e452572c6d1bce3f8c8fba3f2273be0da1d27aae504466b5ae77b309ed91430
-
Size
268KB
-
MD5
78a2937e972b58c050fd05461523c8f3
-
SHA1
fb2acacfd796a2dd99f1b8618d7d953da9bf0cdb
-
SHA256
2e452572c6d1bce3f8c8fba3f2273be0da1d27aae504466b5ae77b309ed91430
-
SHA512
dc5dbb30885b41b4c2d9d079fa87243fca6366154d63a52b0d93517376403bca24d4271495493352486b6719d1bff7fc7236a6869bcf9b90ce36bf796be1544b
-
SSDEEP
3072:fw+kR++jssn25QxNxpmc24MSxdPVhhFtiW2YS/JT6MUP2A9ox54DlsQxIi4nOA/A:jAzVZtwZJUPYoK7lM4Zrrv5DrUMPsx
Malware Config
Signatures
Files
-
2e452572c6d1bce3f8c8fba3f2273be0da1d27aae504466b5ae77b309ed91430.exe windows x86
8f7a910a1851b39d80492fb034464254
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htons
ioctlsocket
inet_addr
inet_ntoa
listen
ntohs
recv
select
accept
send
sendto
setsockopt
socket
gethostbyaddr
gethostbyname
bind
closesocket
WSAGetLastError
WSAStartup
WSACleanup
__WSAFDIsSet
connect
getpeername
getsockname
WSASocketA
htonl
wininet
InternetGetConnectedState
shell32
ShellExecuteA
winmm
mciSendStringA
kernel32
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetCurrentProcess
GetDateFormatA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetProcAddress
GetSystemDirectoryA
GetTickCount
GetTimeFormatA
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatus
CopyFileA
LoadLibraryA
CreateDirectoryA
MoveFileA
OpenProcess
PeekNamedPipe
CreateFileA
ReadFile
RtlUnwind
SetFileAttributesA
SetFilePointer
CreateMutexA
Sleep
TerminateProcess
TerminateThread
CreatePipe
CreateProcessA
WriteFile
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
DeleteFileA
DuplicateHandle
user32
GetWindowTextA
GetForegroundWindow
GetKeyState
GetAsyncKeyState
MapVirtualKeyA
ExitWindowsEx
wsprintfA
CharUpperBuffA
CharToOemA
keybd_event
advapi32
GetUserNameA
RegDeleteValueA
RegCreateKeyA
RegCreateKeyExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
crtdll
__GetMainArgs
atoi
exit
fclose
fopen
fputc
fputs
fread
fwrite
malloc
mbstowcs
memcpy
memset
raise
rand
signal
sprintf
srand
strcat
strchr
strcmp
strncpy
strstr
strtok
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 109KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE